A new report from Microsoft’s Threat Intelligence team highlights that the Iranian hacking group, Mint Sandstorm, is conducting cyberattacks on US critical infrastructure as…
hacking techniques
Researchers Discover Sneaky Espionage Hacking Methods Used by Cranefly
A new backdoor called Danfuan has been connected to a hacking organization that was uncovered and is notorious for attacking employees who deal with…
All Hackers Can Utilize Sophisticated Phishing Techniques Thanks To The New EvilProxy Service
With the promise of stealing authentication tokens to get around multi-factor authentication (MFA) on Apple, Google, Facebook, Microsoft, Twitter, GitHub, GoDaddy, and even PyPI.…
Rootkit iLO attacking HP Servers – CyberDaily
An unknown rootkit has been targeting Hewlett-Packard Enterprise’s Integrated Lights-Out (iLO) server management technology. The hackers have used the iLO to rig the firmware…
Bahamut Group Exploit Phony Android Application, Compromising Data from Signal, WhatsApp Users
Cybercriminals have unleashed a treacherous Android app named ‘SafeChat,’ enabling them to inject devices with spyware capable of siphoning call history, text messages, and…
Supply-chain attack on 3CX Could Impact Thousands of Companies
Hackers may have compromised the networks of thousands of businesses due to a supply-chain attack on the enterprise phone company 3CX, which confirmed on…
Spyware Strikes Again: Google Uncovers Zero Day Shenanigans in Android and iOS!
Google’s Threat Analysis Group (TAG) uncovers new exploit chains that target zero-day and n-day vulnerabilities in Android, iOS, and Chrome. It install commercial spyware…
The Cyberattacks Apocalypse: Last Month’s Most Shocking Attacks
Here are the top cyberattacks from the last month that shook the world. US Marshals service falls victim to a ransomware attack On February…
RedEyes Hackers Stealing Data With New Malware
APT37, a North Korean cyber espionage RedEyes hackers gets support from State. It has recently been seen exploiting Internet Explorer zero-days and distributing various…
Cybercriminals send new phishing campaigns impersonating Flipper Zero to target cyber professionals.
Phishing is on the rise. Recently, there has been a surge of social media accounts and fake websites claiming to sell the highly sought-after…